INDUSTRY GUIDE
PCI Compliance

Levels Of PCI Compliance
In 2006, due to the ubiquity of online shopping and lack of security around a new form of credit card use, American Express, MasterCard, Visa,

MacPayments PCI Program
A stolen credit card means potentially devastating losses for the card network, banks, and the cardholders themselves. That’s why the Payment Card Industry is always

How MacPayments Helps Merchants Stay PCI Compliant
At MacPayments, we understand how vital it is to help merchants stay compliant within the Payment Card Industry’s Data Security Standards. We’ve all seen the

PCI Non-Compliance
Data breaches are the enemy of the payments industry. The PCI-DSS, which stands for Payment Card Industry Data Security Standards, is a set of rules

Card Tokenization
The Next Level in Preventing Credit Card Fraud In recent years, new headlines involving security breaches of big companies like Target and Uber have placed

Credit Card Encryption
Encryption & PCI Compliance Surely you’ve heard about skimmers being placed on gas station pumps or similar, of criminals trying to capture credit card information.

Understanding Data Levels 1 & 2
There are three levels of data that determine authorization and interchange pricing. All transactions require information to be authorized, but certain transactions require more information